Why is 2FA so Important?

Two factor authentication, or 2FA, is a growing necessity for anyone that cares about security. It’s a relatively new addition to IT security networks, but it is one of the simplest and best ways to add an extra layer of security. 2FA is essentially as secondary login confirmation that is needed before someone can access…

Read More

5 Essential IT Services You Should Get From an MSP

Outsourcing IT is becoming a more popular option than ever to help businesses that need affordable and effective IT solutions. But many businesses find that their outsourced IT does not give them the results they want. This leaves them wondering why they are paying for IT services at all. Too often businesses wait for their…

Read More

New Approaches to Malware Protection

Protecting your IT system against Malware is one of the most important parts of any data management plan. These troublesome programs are always updating and finding new ways to cause trouble in people’s systems. Luckily, as the attacks have evolved so have our strategies to fight them off. Following the updates in malware protection and…

Read More

More about the WannaCry Ransomware Attack

WannaCry Ransomware ... History and Things We've Learned

Since WannaCry ransomware began holding hundreds of thousands of computers hostage around the world, a lot has happened. We thought we’d offer an update and yet again reiterate how to avoid paying off cybercriminals to regain access to important computer files. WannaCry, a History WannaCry came on like a giant hail storm from a clear…

Read More

Phishing First Aid

Your work day has just begun. You’re waiting for your coffee to cool enough to sip as your computer powers up. You open your email inbox. You see a message from your bank. You bemusedly wonder why your bank is sending a message to your work email rather than your personal address. You open the…

Read More

What Information is AutoFill Giving Away?

We often address the subject of security, so we want to warn you about new trick being employed by hackers: the information AutoFill is giving away. If you’ve ever completed an online registration for anything, you’ve probably encountered the “autofill” function used by Google Chrome, Safari and other programs. This is when your computer tries to…

Read More

As If You Don’t Enough to Be Afraid Of… Introducing Self-coding Computer Viruses

Take just about any fictional monster, and somewhere there’s a fictional mad scientist who wants to make it even more dangerous. (Anyone remember Jurassic World?) Well, how about taking oh-so-real malware-nasty strings of code that cripple networks, steal data and generally wreak mayhem on the world … and imbuing it with artificial intelligence? Welcome to…

Read More